How to Protect Your Privacy Online
Privacy – 5 min read

How to Protect Your Privacy Online

The most common error people make online is assuming that they are impervious to having their private information taken. There are the well known and more obvious threats that most people are aware of and try to avoid—but most people are still reckless when it comes to protecting their privacy when they are online.

It's not just criminals that are thirsty for your private information. It's also corporations and other businesses that are looking to exploit your personal information for financial gain. And despite what you may think, there is no such thing as a "small fish" when it comes to fishing for private information. There's a lot of money to be made by having as much access to as many people's data as possible.

Some of the biggest mistakes you can make when it comes to protecting your privacy are some of the simplest actions you might take while online.

 

 

You are a Desired Target

 

One of the biggest misconceptions people have about their online privacy is the assumption, "Why would they be interested in me?" It is this attitude that those who want to breach your privacy bank on. Those that feel the least important often end up becoming the most valuable targets.

Remember, cybercriminals tend to limit themselves to outright financial extortion, but companies and corporations seek financial gain through using your private information to target their products and services to you.

 

 

There are many easy steps you can take to keep your private information safe. Here are some of the most efficient but commonly overlooked ways to protect your privacy online.
 

1. Password Protection

 

Always use password protection on all your devices, applications, and programs. Even if you have a desktop at home for personal use only, set a password.

 

2. Strengthen Your Passwords

 

Strengthening your passwords entails 3 key elements:

 

  1. Set a strong and unique password that includes capital letters, numbers, and special characters (exclamation marks, dashes, etc). Over 10 characters is also highly recommended.
  2. Have different passwords for each account. No doubt, it is challenging to keep track of passwords for all your different accounts, but if one account gets hacked, it can cannonball into a wider breach of your privacy. Keeping a written log of your passwords stored somewhere safe in your home is a great way to stay organized.
  3. Change your passwords periodically. It is recommended that you change passwords every six months. Obviously, this is a large undertaking, but at least make an effort to change passwords on your most sensitive accountslike your online banking and work email.

 

3. Be Aware of What You Share on Social Media

 

When you fill out your Facebook profile, you’re not just sharing with your friend group--you are also putting that information out in the open. So take extra caution about what you share. And always keep your profile private, and be about which friend requests you accept--if you don’t know the person well, decline. Hackers often pose as friends by using their pictures and using a misspelled or abbreviated form of their name to gain access to a target’s friend circle.


4. Turn on Private Browsing

 

When accessing sites where you are sharing banking or other sensitive data--such as online retail sites--using the private browsing option on your device.


5. Never Save Password / Credit Card /Personal Information

 

When prompted by your browser to save your information for next time, always decline. Especially when sharing credit card informationdo NOT "save this card for next time.”

 

6. Use Secure Network Connections

 

Especially when making sensitive transactions, make sure you are on a trusted and secure network. So, no online shopping using a coffee shop's public network.


7. Be Cautious of What Information is Being Requested

 

The only, ONLY time your social insurance number should be shared online is on a secure government website. No legitimate workplace, company, or bank would ever ask for your social security number onlineand if they do, decline. Government websites might request this information and so long as you logged on yourselfnot sent a link from an emailit's one of the only instances you should feel safe sharing your SIN.

 

You are a desired target.

 


8. Set Vague Security Answers

 

When asked to set a security question and answer, consider if the account is worthy of requesting such information. Regardless, don't field the questions related to private information, such as mother's maiden name, birthplace, street name, etc. Instead choose security questions that ask for a pet's name or your favourite foodinformation that doesn't offer up key clues to your identity.


9. Don't be Afraid to Ask Questions

 

When asked to offer personal and private information, always consider the source and ask yourself WHY they would need it. If you have reservations, ask why they are requesting you to provide that information. If it is a legitimate request, they will give you a legitimate reason, and be understanding and respectful of your hesitation.

 

10. Never Click on Suspicious Links

 

This one is a big no-no and one that most people are likely aware of. NEVER click on a link from a suspicious or anonymous source. If it looks shady or if it's delivered in an email with minimal or impersonal text in the body, delete it immediately and block the sender.

 

As a rule of thumb, if you have any doubt, just say no and decline. Privacy is most commonly breached in the most obvious and simplest of methods. Privacy breaches target the human nature of believing we are dissociated from threats, and that our online activity is without value. Every aspect of your online activity is of value to someone. Think about how often you are unwittingly presented with advertising catered specifically to your online profile. Staying aware of what you share and who it may benefit allows you to stay in charge of your online privacy.

 

If your business needs help with online privacy, get in touch with CITI. Our solutions will help you manage privacy challenges, such as device protection and stopping hackers from infiltrating your online accounts.

 

 

Learn about your IT security. Register for a free cybersecurity consultation.  Book Now Considering moving to the cloud? Find out if the cloud is right for your  company.Book Now
Guide to Email Security from our Practice Safe Cyber Series Download Your Poster
Global Toronto and CreateTO City of Toronto Agencies Case Study
Learn about your IT security. Register for a free cybersecurity consultation.  Book Now
Guide to Ransomware Attacks in Canada
Considering moving to the cloud? Find out if the cloud is right for your  company.Book Now
New IT Infrastructure Transforms Organization. KCI Ketchum Canada
Engage our services and get 10 hours free. It's easy to work with CITI. Become  a client.Book Appointment

IT Insights from our Blog

Read more

We're here to help!

Moving to the Cloud
Cybersecurity

Is your management team asking about your IT security policies and practices? Are you worried about a cybersecurity breach? CITI’s comprehensive IT security services provide all the information your company needs to deal with current and future security situations and concerns. Learn about your IT security. Register for a free cybersecurity session.

Managed Services

There is another way to manage your IT that doesn’t require you call your IT firm. Managed IT services offer proactive care, support, monitoring and maintenance of your computer systems for a fixed monthly fee. Process-driven, less involvement, more predictable cost. Yes, Virginia, there is a way to keep your IT running smoothly that does not require you to make a call.

Pay-As-You-Go

Are you concerned about minimizing IT maintenance costs? Perhaps you’re techno savvy. Or maybe you only need an IT firm for complex IT situations. CITI can provide exactly the volume of IT services that you want and need from network troubleshooting to helping a user with a jammed printer. Our full range of services are available on a per incident basis.

Disaster Recovery

Is the stuff of your nightmares power outages? The only way to deal with a severe interruption to business operations is to plan for it. Beginning with a disaster recovery plan through implementing and maintaining failsafe, foolproof, rock-solid offsite backups, CITI has helped 100s of companies protect their most valuable asset—their data and systems.

IT Consulting

Uncertain if your company should move to the cloud? Do you have doubts about the best way to back up your data? Looking for ways to minimize your vulnerability to IT security breaches? Perhaps you’re looking for help with your annual IT budget. CITI’s IT advisory services help businesses make informed strategic and tactical decisions on information technology.

Call Us